Cyber Security
ThreatQuotient Achieves SOC 2 Type II Compliance for ThreatQ Platform

ThreatQuotient has announced that it has successfully completed a Service Organization Controls (SOC) 2 Type II compliance audit for its ThreatQ Platform. This certification validates that ThreatQuotient’s security and governance controls previously verified by Type I effectively maintain the security, confidentiality, and availability of their hosted service. The independent firm Clearview Group conducted the audit.
A key industry standard in data security, SOC 2 evaluates a technology service provider’s ability to securely manage customer data. To achieve a SOC 2 Type II designation, organizations undergo a rigorous audit that analyzes the following trust services criteria: security, availability, processing integrity, confidentiality, and privacy. ThreatQuotient’s continued adherence to its policies was tested and confirmed by the Type II audit process.
“It takes tremendous discipline and organization to provide on-demand evidence throughout an audit that a company is exercising their policies and procedures. ThreatQuotient is proud of this achievement, and considers SOC 2 Type II compliance just one of the many ways we intend to continue meeting and exceeding industry security standards,” said Tom Ashoff, Senior Vice President of Engineering, ThreatQuotient. “Achieving a favorable examination of ThreatQ provides our customers the confidence that we have the proper controls in place to protect their data, and assurance of the availability and confidentiality of their hosted service.”
As customer needs continue to evolve, ThreatQuotient is committed to providing innovative threat detection and response solutions. ThreatQuotient recently announced v5 of the ThreatQ platform, launching capabilities needed today to support the security operations center (SOC) of the future, where data is the foundation. ThreatQ connects the dots, bringing an organization’s wealth of data together into a common work surface, providing a data-driven security context that enables teams to be more thorough in their investigations, collaboration, response, and reporting.
Cyber Security
Cloud and IoT Vulnerabilities Expose Smart Cities and Industrial Systems to Cyber Risks

Ezzeldin Husein, the Regional Senior Director for Solution Engineering – META at SentinelOne says cyberattacks on MEA’s critical infrastructure are becoming more sophisticated, with nation-state actors, ransomware gangs, and hacktivists targeting energy, finance, and transportation sectors (more…)
Cyber Security
Cyberattacks on Critical Infrastructure Originate from Nation-State Actors or Sophisticated APT Groups

Saran B. Paramasivam, the Regional Director for Middle East and Africa (MEA) at Zoho says the most notable trends in cyber attacks targeting critical infrastructure systems are the rise of ransomware and social engineering attacks (more…)
Cyber Security
APT Groups Are Increasingly Targeting OT Systems

Ilya Leonov, the Regional Director for MENA at Positive Technologies says many organisations rely on legacy OT systems with limited security controls, making them attractive targets for cybercriminals (more…)
-
Artificial Intelligence1 week ago
DeepSeek-R1 AI Poses 11x Higher Harmful Content Risk
-
Artificial Intelligence6 days ago
DeepSeek Popularity Exploited in Latest PyPI Attack
-
Artificial Intelligence6 days ago
SentinelOne to Spotlight AI-Driven Cybersecurity at LEAP 2025
-
Cyber Security3 days ago
Employees Are the First Line of Defense
-
News5 days ago
Sophos Completes Secureworks Acquisition
-
Homeland Security1 week ago
Daimler Truck Focuses on Growth in the Defence Sector
-
Cyber Security3 days ago
Proactive Threat Intelligence Can Keep Threats at Bay
-
Cyber Security1 week ago
Tenable Plans to Acquire Vulcan Cyber